zux0x3a / TChopper
conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine
☆52Updated 3 years ago
Alternatives and similar repositories for TChopper:
Users that are interested in TChopper are comparing it to the libraries listed below
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆90Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated this week
- This repo hosts a poc of how to execute F# code within an unmanaged process☆65Updated 9 months ago
- ☆24Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 5 months ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- RDP Checker☆63Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆86Updated 2 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 4 years ago
- ☆37Updated 11 months ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆42Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- .NET project for installing Persistence☆64Updated 3 years ago
- ☆42Updated 2 years ago
- ☆31Updated 4 years ago
- ☆12Updated 2 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆53Updated 3 years ago
- A swiss army knife for pentesting networks☆24Updated 2 years ago
- ☆35Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆38Updated 3 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- Generate droppers with encrypted payloads automatically.☆53Updated 3 years ago
- A BOF port of the research of @thefLinkk and @codewhitesec☆98Updated 3 years ago